Explore Catalogue

Discover and learn from our extensive collection of world-class courses and curriculums tailored to your needs

Found 18 results
Sort by:
Show:
Active Filters:
Category: Cybersecurity
Data Privacy and Protection StandardsNew

Data Privacy and Protection Standards

This course provides a comprehensive understanding of the foundational principles of data privacy, the latest in protection standards, and practical approaches to implementing robust data protection measures. Participants will explore key regulations such as the GDPR and CCPA, delve into technical and organizational strategies for data security, and learn how to handle data breaches effectively. Through this course, learners will gain insights into the rights of data subjects and the ethical considerations surrounding data protection. Upon completion, participants will be equipped with the knowledge to navigate the complexities of data privacy laws and implement measures that ensure data integrity and confidentiality.

Product ID: 66d4c2889a59c1c52acfb526
Cyber Security: Building a CyberWarrior Certification – Part 2On Demand

Cyber Security: Building a CyberWarrior Certification – Part 2

Today, the necessity of strong cybersecurity measures is self-evident. A proliferation of cyber-attacks is causing increasing damage to companies, governments and individuals. Yahoo’s disclosure of a massive breach is still making headlines. Organizations need to respond to this increased threat by adopting strict cybersecurity measures. Starweaver is here to help you and your organization respond, building you into "CyberWarriors" with our 7-Part certification program focused on helping you know you to prevent, and face cyber-attacks. This program includes modules on: Part I: Security Skills, Wireshark and Defensive Strategies Part 2: Cyber Ranges, Pentesting, Intrusion Analysis and Handling

Product ID: 66d4c3939a59c1c52ad0606f
Incident Response and Handling for Cyber Security ProfessionalsOn Demand

Incident Response and Handling for Cyber Security Professionals

This course covers the six phases of incident handling and responding as follows:  0- Introduction: Includes the definition of an event, incident, as well as the difference between them  1- Preparation Phase: Shows the elements of preparation and the team building,  2- Identification Phase:  Demonstrates where identification occurs and the assessment for identification  3- Containment: Explains the deployment and categorization needed as well as the short/long- term actions taken  4- Eradication: Stresses on restoring systems and improving defenses  5- Recovery: Elaborates the validation and monitoring required for attacked systems  6- Lessons Learned: Confirms the importance of meeting as a team to fix and improve and to share our experiences with others

Product ID: 66d4c2c29a59c1c52acfda7a
Deception as a DefenseNew

Deception as a Defense

In this course, defensive concepts will be explored and the power of using deception at different layers of the network. The attacker depends on information that is gathered during their surveillance, and with deception we change the network at layer 2-4 and the result of this is the attacker’s collected data is no longer valid and useless for them, this requires the attacker to start the information gathering process over again. In a robust defensive solution, the network can change multiple times based on the classification of the threat, and each time it changes, the attacker is lost and has to start the recon process over again. These concepts change the game and puts the defender in control! The concepts have been deployed at Capture the Flag events and frustrated and confused the hackers for hours!

Product ID: 66d4c2ac9a59c1c52acfca41
GenAI for Cybersecurity AnalystsNew

GenAI for Cybersecurity Analysts

As part of the GenAI Academy, “GenAI for Cybersecurity Analysts” explores how Generative Artificial Intelligence (GenAI) is revolutionizing the field of cybersecurity. This course guides learners through the key capabilities of GenAI and provides practical strategies to leverage these tools in their daily tasks. Through discussions, video demos, and guided hands-on activities, learners will understand how GenAI can enhance productivity in threat detection, risk mitigation, security testing, and more.  Learners will also consider the ethical concerns surrounding the use of GenAI in cybersecurity, examining potential risks and challenges, as well as best practices for responsible implementation. By the end of this course, cybersecurity analysts will be equipped with the knowledge and skills to harness the transformative potential of GenAI to enhance their productivity and effectiveness.  Whether you’re an experienced cybersecurity analyst looking to stay ahead of the curve or an aspiring professional seeking to future-proof your skillset, this course provides a foundation that will empower you to unlock new levels of efficiency, productivity, and creativity in your work.

Product ID: 66d4c2889a59c1c52acfb51e
Introduction to CybersecurityOn Demand

Introduction to Cybersecurity

If you are looking to start your career in cybersecurity or freshly graduated from school, this is the right course for you! Learning cybersecurity is fundamental to every role as a technologist, or a business professional in the technology arena. This course empowers you with foundational cybersecurity skills.  Core cybersecurity fundamentals General overview about Cyber Security Cybersecurity market size Confusions: Cybersecurity or Cyber Security Confusions: Cybersecurity vs information security Cybersecurity professional roadmap Top cybersecurity certifications by Hacker’s techniques and motivations Understand hacker’s mindset Hackers categories What motivates hackers to hack Understand the cybersecurity kill chain Hacking techniques Malicious software used by hackers [LAB] How hackers generate malicious software [LAB] How to detect that your machine is infected and how to protect yourself Cybersecurity law and standards Laws and standards that you need to know ISO27001 NIST Framework PCI-DSS Cybersecurity USA Laws Cybersecurity EU Laws Cybersecurity Australia Laws

Product ID: 66d4c2e19a59c1c52acfede9
Introduction to DevSecOpsOn Demand

Introduction to DevSecOps

This DevOps course is an introduction to DevSecOps and how its applied across the application development lifecycle.  This program starts with some fundamentals about what is DevOps, why DevOps is such an important part of today’s software landscape and what impact it has on systems security.  DevSecOps is a new concept brought on by DevOps and has implications all throughout the software development lifecycle.  This course explores the various aspects of DevSecOps including CI/CD, Containers, SAST, IAST, Dynamic, and scanning for secrets.  In the end we will talk about how we can begin this journey to DevSecOps and end successfully. The program contains 10 modules and 3 hours of content.

Product ID: 66d4c2ed9a59c1c52acff686
Introduction to Prompt Injection VulnerabilitiesNew

Introduction to Prompt Injection Vulnerabilities

In this course, we enter the space of Prompt Injection Attacks, a critical concern for businesses utilizing Large Language Model systems in their AI applications. By exploring practical examples and real-world implications, such as potential data breaches, system malfunctions, and compromised user interactions, you will grasp the mechanics of these attacks and their potential impact on AI systems.  As businesses increasingly rely on AI applications, understanding and mitigating Prompt Injection Attacks is essential for safeguarding data and ensuring operational continuity. This course empowers you to recognize vulnerabilities, assess risks, and implement effective countermeasures.  By the end of this course, you will be equipped with actionable insights and strategies to protect your organization's AI systems from the ever-evolving threat landscape, making you an asset in today's AI-driven business environment.

Product ID: 66d4c2ac9a59c1c52acfcaa9
Introduction to Cybersecurity FundamentalsNew

Introduction to Cybersecurity Fundamentals

This course focuses on building a foundation for the principles of Cyber Security and protections of data within computers, devices and networks. You will look at the concept of “thinking like a hacker” to learn techniques to defend from the types of attacks that are commonly conducted. Once your foundation has been set you will look at the best practices recommendations when it comes to protecting your data and privacy.

Product ID: 66d4c2b79a59c1c52acfd14e
Essential Guide to CybersecurityOn Demand

Essential Guide to Cybersecurity

Organizations which control, store, or transmit data are increasingly exposed to active hackers, phishing scams and other threats that arise from poor information security. Cybersecurity Essentials is the ideal course for anyone who needs to get a good all-round understanding of Cybersecurity. It provides an understanding of the fundamental principles of cybersecurity at a decision-making level. You don't have to be an aspiring security professional to do this course, it is suitable for everyone. This course represents the essentials of Cybersecurity, and it is designed in the way that the capabilities learned by following this training course will be used to protect organizations and the society as a whole from areas of emerging threats.

Product ID: 66d4c2e19a59c1c52acfede4